Vulnerability Description
If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape any data passed into the <script> block.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Go | < 1.25.10 |
Related Weaknesses (CWE)
References
- https://go.dev/cl/771180Patch
- https://go.dev/issue/78981Patch
- https://groups.google.com/g/golang-announce/c/qcCIEXso47MRelease Notes
- https://pkg.go.dev/vuln/GO-2026-4980Vendor Advisory
FAQ
What is CVE-2026-39826?
CVE-2026-39826 is a vulnerability with a CVSS score of 6.1 (MEDIUM). If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape an...
How severe is CVE-2026-39826?
CVE-2026-39826 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-39826?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Go.